Sentar Inc. · 2 months ago
Cybersecurity Analyst – Operations Watch Analyst (Tier 1–3)
Sentar Inc. is an employee-owned company dedicated to developing critical talent in cybersecurity, intelligence, analytics, and systems engineering. The Cybersecurity Analyst – Operations Watch Analyst will identify, investigate, report, and mitigate cyber incidents, ensuring timely detection and response to security events across network environments.
AnalyticsCyber SecurityInformation ServicesInformation TechnologyIntelligent Systems
Responsibilities
Maintain a thorough working knowledge of CJCSM 6510.01B and ensure compliance with related policies and procedures
Develop, maintain, and continuously improve Standard Operating Procedures (SOPs) for operational watch functions
Conduct proactive network intrusion detection, monitoring, correlation, and analysis to identify potential threats
Validate and assess suspicious events to determine if they meet incident criteria, ensuring accurate and timely entry into designated reporting systems
Coordinate with Joint Force Headquarters-DoDIN (JFHQ-DoDIN) and supported organizations to ensure appropriate analysis, reporting, and escalation of significant incidents
Provide 24/7 incident response coverage, including after-hours and surge support as mission needs dictate
Perform network and host-based digital forensics across Microsoft Windows and other operating systems to support incident analysis and remediation
Analyze full packet captures (PCAP) using tools such as Wireshark and other network forensic utilities
Correlate system and network activity using Splunk and other log aggregation tools to detect anomalies and potential intrusions
Develop, tune, and implement Intrusion Detection/Prevention System (IDS/IPS) signatures to enhance detection accuracy and minimize false positives
Participate in program reviews, product assessments, and on-site certification evaluations to strengthen cyber defense posture
Support a rotating shift schedule (4x10-hour workdays), including at least one weekend day
Work collaboratively in a high-tempo, mission-focused environment requiring flexibility and occasional overtime for surge operations
Qualification
Required
Secret with upgrade to TS required
Bachelor's degree in Cybersecurity, Information Technology, or a related field; or a minimum of three years of directly relevant experience, preferably within a DoD or federal cybersecurity environment
Willingness to travel up to 15% globally, including short-notice (72-hour) deployments in support of incident response operations
Must hold an IAT Level II (Tier 1 and 2) or IAT Level III (Tier 3) certification (per DoD 8570.01-M) and PWS certification requirements in accordance with DoD cybersecurity workforce requirements
Maintain a thorough working knowledge of CJCSM 6510.01B and ensure compliance with related policies and procedures
Develop, maintain, and continuously improve Standard Operating Procedures (SOPs) for operational watch functions
Conduct proactive network intrusion detection, monitoring, correlation, and analysis to identify potential threats
Validate and assess suspicious events to determine if they meet incident criteria, ensuring accurate and timely entry into designated reporting systems
Coordinate with Joint Force Headquarters-DoDIN (JFHQ-DoDIN) and supported organizations to ensure appropriate analysis, reporting, and escalation of significant incidents
Provide 24/7 incident response coverage, including after-hours and surge support as mission needs dictate
Perform network and host-based digital forensics across Microsoft Windows and other operating systems to support incident analysis and remediation
Analyze full packet captures (PCAP) using tools such as Wireshark and other network forensic utilities
Correlate system and network activity using Splunk and other log aggregation tools to detect anomalies and potential intrusions
Develop, tune, and implement Intrusion Detection/Prevention System (IDS/IPS) signatures to enhance detection accuracy and minimize false positives
Participate in program reviews, product assessments, and on-site certification evaluations to strengthen cyber defense posture
Support a rotating shift schedule (4x10-hour workdays), including at least one weekend day
Work collaboratively in a high-tempo, mission-focused environment requiring flexibility and occasional overtime for surge operations
Preferred
Five or more years of cybersecurity incident response experience
Strong knowledge of incident response procedures, packet analysis, IDS/IPS technologies, and host-based security tools
Proficiency in log correlation and analysis using tools such as Splunk, Elastic, or equivalent platforms
Familiarity with digital forensics tools and methodologies
Demonstrated ability to analyze complex issues, think critically, and operate independently under pressure
Excellent written and verbal communication skills to support operational reporting and coordination
In-depth understanding of CJCSM 6510.01B reporting requirements
Prior experience in DoD environments
Experience conducting digital forensics and malware analysis
Benefits
Voluntary Medical, Dental, Vision, with Health Savings or Flexible Spending Plan options
Voluntary Life, Critical Illness, Accident, and Long Term Care insurance options
Group Term Life, Short-Term and Long-Term Disability is provided by Sentar to all qualifying employees
Generous 401(k) match
Competitive PTO plan that graduates quickly with years of service
Other leave programs; holiday schedule along with bereavement, maternity, jury and military duty
Mental health awareness programs
Tuition reimbursement
Professional development reimbursement
Recognition and Awards programs
Company
Sentar Inc.
Sentar, an employee-owned company, is a leading cyber-intelligence solutions provider focused on the National Security sector.
Funding
Current Stage
Growth StageTotal Funding
unknownKey Investors
US Department of Energy
2023-08-17Grant
2021-03-11Acquired
Leadership Team
Recent News
2025-07-15
Company data provided by crunchbase